Splunk Search

Can't find the timestamp

jetzt82
Explorer
AUTOLOGIN..10100000000001..Polaris/5.0 (pc, Windows 7/6.1, ja-JP) PolarisOfficeLink/1.8.14..**1415285996**..192.168.0.1
AUTOLOGIN..10100000000003..Polaris/5.0 (ipad, ios/7.100000, es-CO) PolarisPlugin/6.0.9279.01-IU40 Version/6.0.1 Model/iPad2,5-{768, 1024}..**1415285996**..192.168.0.3
LOGIN..10100000000006..Polaris/5.0 (iphone, ios/8.000000, en-VN) PolarisPlugin/6.0.9279.01-IU40 Version/6.0.1 Model/iPhone7,2-{640, 1136}..**1415285997**..192.168.0.5

When the above log, can not find the time.
timestamp value: 1415285996, 1415285996, 1415285997

How can I find a timestamp?

Tags (2)

grijhwani
Motivator

The quickest way would be to use the interactive field extractor when viewing the log.

But if you want to do it manually a regex along the lines of \*\*(?P< epochtime >)\*\* should do it for you.

grijhwani
Motivator

Had to introduce bogus spaces into the answer above, because the form was removing anything in angle brackets.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...